You get home after a great night out. You're thinking you'll be a bit tired for tomorrow morning's meeting but it was worth it to see your friends. You're just about to put your keys into the lock, when the door opens. The lock's broken. You move from mellow to misery, via terror, in about half a second. You've been burgled, done over, invaded. Your deadlock's deadbeat.

Tor was originally set up in the mid-1990s and offers anonymous browsing to people across the world. It now hosts roughly 30,000 hidden sites. Users in countries with strict censorship laws can use it to access mainstream sites and exchange information securely.

You can buy pretty much anything on the internet. You just need to know where to look. For most of us, the only times we'd venture off the beaten track would be to find a specialist birthday gift perhaps, or a niche item you spotted on Pinterest, Facebook or Reddit. But what might surprise you is that in some places, your digital belongings could also be listed for sale - all at rock bottom prices.

Teenagers might have all the latest apps and a better understanding of the online world in general than many adults, but the fact remains that they are not good at protecting their data, whether by failing to back up their important files and photos or through over-sharing of personal information

There are also wider lessons for any other business or organisation - given the dependency of all institutions on IT systems, the large numbers of users and devices that connect to those systems and the increasing requirement for 'always on' capability. This blog post will address five key observations that are aimed at stimulating planning and thinking.

The UK General Election is now only a week away, and it arrives against the backdrop of media hype and coverage surrounding possible attempts by hackers to influence national elections (see: US, French elections).

The digital age has brought huge benefits to Britain, but new and different challenges too. Our ability as individuals to use digital technology - find and share information, do our shopping, pay our bills and communicate with one another - has grown more quickly than our knowledge of how to do all those things safely.

This is not said by way of criticism, but rather to acknowledge the challenge inherent within security innovation. Companies and governments can't afford to expose their digital security set-up, but must somehow find a way to embrace new innovations or the hackers will, inevitably, find a way through.

These worrying statistics highlight just how vulnerable the business community remains to data breaches, even after an unprecedented period of public disclosures. Britain's businesses cannot continue to treat cyber security as a box-ticking exercise and risk falling foul of harmful attacks.

In today's connected world securing your own network is simply not enough. Today your digital risk extends not only to your own servers, PCs and other devices in your offices and other locations; it also extends to your mobile workers and other staff working from home, customer sites and other remote locations. But the third, and often ignored, area of digital risk is your supply chain; companies that have access to your employee and customer information.

In the eighteenth century, travellers could be waylaid by a highwayman - a thief who held up coaches on the public highway and demanded that those on board hand over their money and other valuables. The highwayman would typically issue the challenge - 'Stand and deliver: your money or your life!

Malicious actors have a range of motivations, including geopolitical, ideological and espionage purposes. However, it is the financially-motivated cybercriminals we commonly see targeting the organizations we work with. These actors will go wherever the money is. Pure and simple.

We live in a world dominated by smartphones and tablets, and by the applications that run on these mobile devices. These applications help us with everything, including expenses, mobile banking, the weather and access to your corporate and personal email

With so much at stake and so much already invested in security systems to then allow cybercriminals a way into the organization that's completely beyond the IT department's control is the business equivalent of shooting yourself in the foot.

We need more people to realize cybersecurity is an interesting and exciting career so we can have the skills and expertise for the future that we need to protect people, governments and organisations from the menace of professional cybercriminality.